CN105931330A - Intelligent unlocking method and intelligent lock - Google Patents

Intelligent unlocking method and intelligent lock Download PDF

Info

Publication number
CN105931330A
CN105931330A CN201610245086.3A CN201610245086A CN105931330A CN 105931330 A CN105931330 A CN 105931330A CN 201610245086 A CN201610245086 A CN 201610245086A CN 105931330 A CN105931330 A CN 105931330A
Authority
CN
China
Prior art keywords
mobile terminal
lock
bluetooth
instruction
unblank
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610245086.3A
Other languages
Chinese (zh)
Other versions
CN105931330B (en
Inventor
罗松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201610245086.3A priority Critical patent/CN105931330B/en
Publication of CN105931330A publication Critical patent/CN105931330A/en
Application granted granted Critical
Publication of CN105931330B publication Critical patent/CN105931330B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks

Abstract

The invention provides an intelligent unlocking method and an intelligent lock. The intelligent unlocking method comprises the following steps: receiving a first unlocking instruction transmitted by a mobile terminal via a Bluetooth trusted communication interface; acquiring intensity of a Bluetooth signal and determining whether the intensity of the Bluetooth signal meets a preset condition; acquiring and verifying terminal information in the first unlocking instruction if the preset condition is met; and carrying out unlocking operation in response to the first unlocking instruction when verification of the terminal information is succeed. According to the invention, the unlocking instruction transmitted by a Bluetooth module in the mobile terminal is used for unlocking, so unlocking operation can be omitted, time is saved, and convenience is obtained; and unlocking can be carried out via the carried mobile terminal without any extra unlocking tool, which enables convenience to be further improved.

Description

Intelligent unlocking method and smart lock
Technical field
The present invention relates to technical field of security and protection, specifically, the present invention relates to a kind of Intelligent unlocking method And smart lock.
Background technology
Along with the development of large scale integrated circuit technology, occur in that the intelligent cipher with microprocessor Locking, it also introduces the function of intelligentized control method in addition to the function with electronic password lock, so that Coded lock has the highest safety, reliability, applies increasingly extensive.
Traditional smart lock, needs user at lock end by fingerprint recognition, iris identification, Password Input Just can complete to unblank Deng unlocking operation, this mode of unblanking also exists the shortcoming lost time, convenience The highest;And complete to unblank by the unlocking tool (such as integrated circuit card) with integrated circuit, though So save the time of unlocking operation, additionally carried unlocking tool yet with needs, bring to user Certain inconvenience, convenience is poor.
Summary of the invention
The purpose of the present invention is intended at least can solve one of above-mentioned technological deficiency, especially with facility The technological deficiency that property is the highest.
The present invention provides a kind of Intelligent unlocking method, is applied to lock end, comprises the steps:
Trust the first of communication interface reception mobile terminal transmission by bluetooth to unblank to instruct;
Obtain Bluetooth signal intensity, and it is pre-conditioned to judge whether Bluetooth signal intensity meets;
When meeting pre-conditioned, obtain first unblank instruction in end message and verify;
When described end message is proved to be successful, response the first instruction of unblanking carries out unlocking operation.
In the present invention, described end message includes the unique identification information of described mobile terminal or authorizes account Number information.
In the present invention, described mandate account information includes the mandate account directly authorized by lock end or by having There is the temporary Authorization account that the mobile terminal of authorization privilege authorizes indirectly.
In the present invention, by the trust user profile prestored, end message is verified.
In the present invention, described in the trust user profile that prestores include the trust user profile more than one group, Between the user of different groups, there is different user rights.
In the present invention, described in the pre-storage method of trust user profile that prestores include:
Set up the Trusted channel with mobile terminal;
Obtain the user profile that mobile terminal provides;
Give the corresponding user right of user of described user profile and be stored as trusting user profile.
In the present invention, described foundation includes with the Trusted channel of mobile terminal:
Set up the bluetooth Trusted channel with mobile terminal;
Or
By showing that Quick Response Code for mobile scanning terminal and sets up Trusted channel.
In the present invention, trust the first of communication interface reception mobile terminal transmission by bluetooth and unblank to instruct Before, also include the step judging duty, when duty is normal condition, just perform logical Cross bluetooth and trust the step that the first of communication interface reception mobile terminal transmission is unblanked to instruct.
In the present invention, when duty is normal condition, also execute the following steps:
Trust the second of communication interface reception bluetooth link terminal transmission by bluetooth to unblank to instruct;
Obtain second unblank instruction in end message and verify;
When described end message is proved to be successful, response the second instruction of unblanking carries out unlocking operation;
Wherein, the remote unlocking instruction that described bluetooth link terminal sends for receiving mobile terminal, and Generate the second of blue-teeth data form according to the instruction of described remote unlocking to unblank to instruct.
In the present invention, the remote unlocking that described bluetooth link terminal forwards for receiving local router refers to Order, and unblank to instruct according to the second of described remote unlocking instruction generation blue-teeth data form;Wherein, The instruction of described remote unlocking is sent to described local router by mobile terminal by telecommunication passage.
In the present invention, described telecommunication passage includes mobile data network or WiFi network.
In the present invention, when duty is guard mode, refusal response described first is unblanked to instruct.
In the present invention, described first unblanks instructs as described mobile terminal after checking finger print information success Send.
In the present invention, described first unblank instruction identifying default incoming event for described mobile terminal Rear transmission.
In the present invention, described unlocking operation includes that locking end directly unblanks or lock end to provide that manually unblanks to permit Permitted.
In the present invention, described unlocking operation is for opening the first lock;
When described end message is proved to be successful, response first is unblanked after instruction carries out unlocking operation, Further comprise the steps of: identification and verify finger print information, and after being proved to be successful, opening the second lock.
In the present invention, described end message is interrelated with described finger print information.
In the present invention, if the outdoor finger print information identification module identification that described finger print information is lock end, then In described identification and verify finger print information, and after opening the step of the second lock after being proved to be successful, enter Enter no longer to respond the state that the first of described mobile terminal unblanks to instruct, and at the indoor fingerprint letter of lock end Breath identification module opens described first lock and the second lock after re-recognizing and verify finger print information success.
In the present invention, the indoor finger print information identification module at lock end re-recognizes and verifies finger print information After opening described first lock and the second lock after success, exit no longer responding the first of described mobile terminal and open The state of lock instruction.
In the present invention, when be simultaneously received the transmission of more than one mobile terminal first unblanks instruction, If the outdoor finger print information identification module identification that described finger print information is lock end, then in described identification and test Card finger print information, and after being proved to be successful after the step of unlatching the second lock, enter no longer response described In more than one mobile terminal the first of arbitrary mobile terminal unblank instruction state, and lock end room Interior finger print information identification module re-recognizes and verifies and arbitrary shifting in described more than one mobile terminal Described first lock and the second lock is opened after the finger print information success that dynamic terminal is associated.
The present invention also provides for a kind of smart lock, including:
Receiver module, unblanks for trusting the first of communication interface reception mobile terminal transmission by bluetooth Instruction;
Monitoring modular, is used for obtaining Bluetooth signal intensity, and it is pre-to judge whether Bluetooth signal intensity meets If condition;
Authentication module, when meeting pre-conditioned, for obtaining the first end message unblanked in instruction And verify;And
Perform module, when described end message is proved to be successful, carry out for response the first instruction of unblanking Unlocking operation.
In the present invention, described end message includes the unique identification information of described mobile terminal or authorizes account Number information.
In the present invention, described mandate account information is by locking mandate account that end directly authorizes or being awarded by having The temporary Authorization account that the mobile terminal of power authority authorizes indirectly.
In the present invention, also include for the pre-storing module trusting user profile that prestores, described authentication module By the trust user profile prestored, end message is verified.
In the present invention, described in the trust user profile that prestores include the trust user profile more than one group, Between the user of different groups, there is different user rights.
In the present invention, described pre-storing module is used for:
Set up the Trusted channel with mobile terminal;
Obtain the user profile that mobile terminal provides;
Give the corresponding user right of user of described user profile and be stored as trusting user profile.
In the present invention, described foundation includes with the Trusted channel of mobile terminal:
Set up the bluetooth Trusted channel with mobile terminal;
Or
By showing that Quick Response Code for mobile scanning terminal and sets up Trusted channel.
In the present invention, also including judge module, described judge module is for passing through at described receiver module Bluetooth is trusted before the first of communication interface reception mobile terminal transmission is unblanked to instruct and is judged duty, When duty is normal condition, described receiver module is just trusted communication interface by bluetooth and is received shifting The first of dynamic terminal transmission unblanks to instruct.
In the present invention, when duty is normal condition:
Receiver module is additionally operable to trust that communication interface receives that bluetooth link terminal sends by bluetooth the Two unblank instructs;
Authentication module is additionally operable to obtain second and unblanks the end message in instruction verifying;
When described end message is proved to be successful, performs module and be additionally operable to respond the second instruction of unblanking and carry out Unlocking operation;
Wherein, the remote unlocking instruction that described bluetooth link terminal sends for receiving mobile terminal, and Generate the second of blue-teeth data form according to the instruction of described remote unlocking to unblank to instruct.
In the present invention, the remote unlocking that described bluetooth link terminal forwards for receiving local router refers to Order, and unblank to instruct according to the second of described remote unlocking instruction generation blue-teeth data form;Wherein, The instruction of described remote unlocking is sent to described local router by mobile terminal by telecommunication passage.
In the present invention, described telecommunication passage includes mobile data network or WiFi network.
In the present invention, when duty is guard mode, described execution module refusal response described the One unblanks instructs.
In the present invention, described first unblanks instructs as described mobile terminal after checking finger print information success Send.
In the present invention, described first unblank instruction identifying default incoming event for described mobile terminal Rear transmission.
In the present invention, described unlocking operation includes that locking end directly unblanks or lock end to provide that manually unblanks to permit Permitted.
In the present invention, described smart lock includes the first lock and the second lock, also includes finger print information identification mould Block;
Described unlocking operation is for opening the first lock;
When described end message is proved to be successful, response first is unblanked after instruction carries out unlocking operation, Described finger print information identification module identification also verifies finger print information, and described execution module is after being proved to be successful Open the second lock.
In the present invention, described end message is interrelated with described finger print information.
In the present invention, described finger print information identification module includes outdoor finger print information identification module and indoor Finger print information identification module;
If described finger print information is described outdoor finger print information identification module identification, then refer in described outdoor Stricture of vagina information identification module identification also verifies that finger print information and described execution module are opened after being proved to be successful Second lock after, described execution module enter no longer respond the first of described mobile terminal unblank instruction State, and open after described indoor finger print information identification module re-recognizes and verify finger print information success Open described first lock and the second lock.
In the present invention, re-recognize and verify that finger print information becomes at described indoor finger print information identification module After opening described first lock and the second lock after merit, described execution module exits and no longer responds described movement eventually End first unblank instruction state.
In the present invention, when described receiver module is simultaneously received first that more than one mobile terminal sends When unblanking to instruct, if described finger print information is described outdoor finger print information identification module identification, then in institute State outdoor finger print information identification module identification and verify that finger print information and described execution module are being verified into After opening the second lock after merit, described execution module enters and no longer responds described more than one mobile terminal In the first state unblanking instruction of arbitrary mobile terminal, and at described indoor finger print information identification module Re-recognize and verify the fingerprint being associated with arbitrary mobile terminal in described more than one mobile terminal Described first lock and the second lock is opened after information success.
Above-mentioned Intelligent unlocking method and smart lock, trust communication interface by bluetooth and receive mobile terminal First sent unblanks to instruct;Obtain Bluetooth signal intensity, and judge whether Bluetooth signal intensity meets Pre-conditioned;When meeting pre-conditioned, obtain first unblank instruction in end message and verify; When described end message is proved to be successful, response the first instruction of unblanking carries out unlocking operation;Utilize mobile The bluetooth module of terminal transmits instruction of unblanking and goes to unblank, and can save unlocking operation, saves the time, just Profit is preferable;And can realize unblanking just with the mobile terminal carried with, it is not necessary to use Extra unlocking tool, convenience improves further.
Aspect and advantage that the present invention adds will part be given in the following description, and these will be from following Description in become obvious, or recognized by the practice of the present invention.
Accompanying drawing explanation
Present invention aspect that is above-mentioned and/or that add and advantage are from retouching embodiment below in conjunction with the accompanying drawings Will be apparent from easy to understand in stating, wherein:
Fig. 1 is the Intelligent unlocking method schematic diagram of an embodiment;
Fig. 2 is the method schematic diagram of Intelligent unlocking in normal state of an embodiment;
Fig. 3 is the smart lock module diagram of an embodiment.
Detailed description of the invention
Embodiments of the invention are described below in detail, and the example of described embodiment is shown in the drawings, its In the most same or similar label represent same or similar element or have same or like The element of function.The embodiment described below with reference to accompanying drawing is exemplary, is only used for explaining this Invention, and be not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative used herein " one ", " one ", " described " and " being somebody's turn to do " may also comprise plural form.It is to be further understood that The wording used in the description of the present invention " includes " referring to there is described feature, integer, step, behaviour Make, element and/or assembly, but it is not excluded that existence or add other features one or more, whole Number, step, operation, element, assembly and/or their group.It should be understood that when we claim element Being " connected " or during " coupled " to another element, it can be directly connected or coupled to other elements, or Intermediary element can also be there is in person.Additionally, " connection " used herein or " coupling " can include wireless Connect or wireless couple.Wording "and/or" used herein includes that what one or more was associated lists Whole or any cell of item and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technical term and scientific terminology), have and the those of ordinary skill in art of the present invention Be commonly understood by identical meaning.Should also be understood that those arts defined in such as general dictionary Language, it should be understood that there is the meaning consistent with the meaning in the context of prior art, and remove Non-as here by specific definitions, otherwise will not with idealization or the most formal implication explain.
Those skilled in the art of the present technique be both appreciated that " terminal " used herein above, " terminal unit " Including the equipment of wireless signal receiver, it only possesses the setting of wireless signal receiver of non-emissive ability Standby, include again the equipment receiving and launching hardware, it has and can perform on bidirectional communication link The reception of two-way communication and the equipment of transmitting hardware.This equipment may include that honeycomb or other communication Equipment, its have single line display or multi-line display or the honeycomb not having multi-line display or Other communication equipments;PCS (Personal Communications Service, PCS Personal Communications System), It can process with combine voice, data, fax and/or its communication ability;PDA(Personal Digital Assistant, personal digital assistant), it can include radio frequency receiver, pager, mutually The access of networking/Intranet, web browser, notepad, calendar and/or GPS (Global Positioning System, global positioning system) receptor;Conventional laptop and/or palmtop computer or other set Standby, its have and/or include the conventional laptop of radio frequency receiver and/or palmtop computer or other Equipment." terminal " used herein above, " terminal unit " can be portable, can transport, be arranged on In the vehicles (aviation, sea-freight and/or land), or it is suitable for and/or is configured in this locality Run, and/or with distribution form, any other position operating in the earth and/or space is run.This In " terminal ", " terminal unit " that used can also is that communication terminal, access terminals, music/video Playback terminal, such as, can be that (Mobile Internet Device, mobile Internet sets for PDA, MID Standby) and/or there is the mobile phone of music/video playing function, it is also possible to it is intelligent television, machine top The equipment such as box.
Those skilled in the art of the present technique are appreciated that remote network devices used herein above, and it includes But it is not limited to computer, network host, single network server, multiple webserver collection or multiple The cloud that server is constituted.Here, cloud is by a large amount of calculating based on cloud computing (Cloud Computing) Machine or the webserver are constituted, and wherein, cloud computing is the one of Distributed Calculation, by the loose coupling of a group One super virtual machine of the computer collection composition closed.In embodiments of the invention, far-end network Can realize communicating by any communication mode between equipment, terminal unit with WNS server, including But it is not limited to, mobile communication based on 3GPP, LTE, WIMAX, based on TCP/IP, UDP The computer network communication of agreement and based on bluetooth, the low coverage side of being wirelessly transferred of infrared transmission standard Formula.
Fig. 1 is the Intelligent unlocking method schematic diagram of an embodiment.
The present invention provides a kind of Intelligent unlocking method, is applied to lock end, comprises the steps:
Step S100: judge duty.
Lock end can be preset with multiple duty.Here duty, for locking the duty of end, Multiple predefined or user-defined duty can be included, such as, can include normal shape State, guard mode, mode state etc. is set.In the following description, the main lock end that describes is in work Time normal condition and guard mode, and lock the end setting when user setup parameter or user profile Mode state.It is appreciated that duty can also include other duties freely defined.
Normal condition, is defined as locking end state in which normal use when, in this condition, All unlocking functions of lock end can be used.And guard mode, then it is defined as locking end in protection State in which under pattern, in this condition, the part unlocking function of lock end is rejected use.Refused The part unlocking function used absolutely can be arranged voluntarily by user, it is also possible to pre-when being product export If.Such as, when family have child and be grown up cannot guard at any time time, need in view of safety factors And the unlocking function that part is easily used by child is disabled, this kind of unlocking function such as includes by moving The function that dynamic terminal Bluetooth is unblanked, the function unblanked by integrated circuit card or only by password with regard to energy The function unblanked.
Accordingly, it would be desirable to the duty of lock end is judged, when locking end and being operated in normal condition, Carry out step S110;When locking end and being operated in guard mode, perform step S112.Step S112: When duty is guard mode, lock end refusal response first is unblanked to instruct.Namely work as duty During for guard mode, even if locking second that end receives first and unblanks to instruct or be described below Unblank to instruct, all without responding.
Step S110: trust the first of communication interface reception mobile terminal transmission by bluetooth and unblank to refer to Order.Mobile terminal can be smart mobile phone, intelligent watch, panel computer etc. portable set.
Bluetooth trusts communication interface it can be understood as lock end carried out bluetooth with mobile terminal the most in advance The communication interface matched and formed.Such as, lock end and mobile terminal have arrived in user's hands user again by it Bluetooth pairing.Through lock end and the mobile terminal of a Bluetooth pairing, it is equivalent to bluetooth pre-established Trust communication interface, so lock end and mobile terminal can directly build when bluetooth connects upper once carrying out Vertical Trusted channel, no longer carries out Bluetooth pairing.
Therefore, first to unblank to instruct be packet based on Bluetooth protocol.In order to reduce energy consumption, permissible Use bluetooth low energy consumption (BLE) technology.BLE technology uses interval of variable Connection Time, this Every could be arranged to several milliseconds to several seconds according to concrete application.It addition, because BLE technology is adopted By very quickly connected mode, may be at the most at ordinary times " disconnected " state (Standby, Holding state) to reduce energy consumption, now both link ends the most simply knows the other side, only in necessity Time just open link, then within the shortest time close link.Therefore, mobile terminal is not Need to send first to unblank to may be at holding state when of instruction, send first at needs and unblank to refer to Time the when of order (after such as identifying corresponding incoming event), mobile terminal switches from holding state To broadcast state to send broadcast message.Mobile terminal is during sending broadcast message, it is common that in advance If broadcast duration periodically send broadcast message.
First instruction of unblanking includes unblank code and end message.End message includes that mobile terminal is only One identification information or mandate account information.In the present embodiment, account information is authorized to include by lock end straight The mandate account connecing mandate or the temporary Authorization account indirectly authorized by the mobile terminal with authorization privilege Number.
The unique identification information of mobile terminal, for uniquely identifying mobile terminal, can be mobile terminal Physical address (MAC), it is also possible to be the IMEI of mobile terminal.When end message includes mobile whole During the unique identification information held, the unique identification information of the mobile terminal of lock end checking, and verifying into Just unblank after merit, as long as in other words lock end identifies mobile terminal and can unblank.
Authorizing account information can be divided into two kinds, the first is the mandate account directly authorized by lock end, The second is the mandate account indirectly authorized by the mobile terminal with authorization privilege.The first can be The mandate account of lock end direct giving mobile terminal when that lock end and mobile terminal setting up data cube computation, This mandate account is stored in white list by locking end, belongs to permanent effective account;The second can be The temporary Authorization account given to other mobile terminals again by the mobile terminal directly authorized by lock end Number, temporary Authorization account here can be that mobile terminal is according to authorizing account and the create-rule preset (algorithm) generates, and this temporary Authorization account, can be by owing to having mapping contact with authorizing account Lock end identification, belongs to the effective account of short-term or disposable account (be used only once or for several times).
Such as, for mobile terminal 1, the lock direct giving mobile terminal of end 1 forever effectively authorizes account Number A, mobile terminal 1 can use mandate account A to unblank;Mobile terminal 1 can also basis Account A and generating algorithm K preset is authorized to generate temporary Authorization account a, and by temporary Authorization account A is sent to mobile terminal 2, and mobile terminal 2 re-uses temporary Authorization account a and unblanks, and lock end is being received After temporary Authorization account a, generating algorithm K is utilized to identify as authorizing account A indirectly to authorize Account, thus lock end and unblank so that mobile terminal 2 can utilize temporary Authorization account a to unblank. Temporary Authorization account a is the effective account of short-term or disposable account, such as can only be in 5 minutes Effectively or be used only once or for several times.
When temporary Authorization account a is the effective account of short-term, mobile terminal 1 needs to authorize account The generation moment T of a sends a mobile terminal 2, and therefore lock end and mobile terminal 1 need have synchronization Time, this can pre-set lock in time.Such as at T sometime, mobile terminal 1 According to authorizing account A, generating algorithm K and generating moment T generation temporary Authorization account a, lock end obtains Generating algorithm K is utilized to identify mandate account A and generate moment T after taking temporary Authorization account a, from And the effective time generating moment T deduction temporary Authorization account a can be utilized.
First unblank instruction the pattern of BLE broadcast message can be used to send.
In BLE technology, usual broadcast message has a data below structure:
Preamble Access Address PDU CRC
1 (byte) 4 (bytes) 2-39 (byte) 3 (bytes)
0x25
Preamble is preamble, and Access Address is reference address, and PDU is payload Data, CRC is check code.
PDU data has a data below structure:
Wherein Header is data head, and Payload is load data.Payload is divided into two parts, AdvA is broadcast address, and AdvData is broadcast data.Header generally includes broadcast-type information, Such as:
ADV_IND: omnidirectional broadcast can be connected
ADV_DIRECT_IND: directional broadcasting can be connected
ADV_NONCONN_IND: omnidirectional broadcast can not be connected
ADV_SCAN_IND: omnidirectional broadcast can be scanned
Therefore, the physical address (MAC) of mobile terminal can be positioned over AdvA, and code of unblanking And/or end message (such as authorizing account information) can be positioned over AdvData.
In the present embodiment, first unblanks, and can be mobile terminal send out after checking finger print information success in instruction Send.Namely it is front to unblank to instruct (step S110) in transmission first, mobile terminal may require that acquisition The finger print information of user is also verified, unblanks instruction by just sending first after fingerprint authentication.First unblanks Instruction can be that mobile terminal sends after identifying default incoming event, i.e. user enters at mobile terminal Just send first after the corresponding input operation of row to unblank to instruct.First instruction of unblanking can also be to move Terminal begins to send voluntarily the when of lock end being detected.
Below instruction of only unblanking to first is illustrated, and in fact the first instruction of unblanking can be it His data mode, as long as meeting Bluetooth protocol.After step S110, perform step S120.
Step S120: obtain Bluetooth signal intensity, and it is default to judge whether Bluetooth signal intensity meets Condition.Bluetooth signal intensity can represent by RSSI value, lock end get first unblank instruction after, Bluetooth signal intensity level can be obtained, and it is pre-conditioned to judge whether Bluetooth signal intensity meets.Obtain The technology of Bluetooth signal intensity belongs to common technology, does not repeats them here.The size of Bluetooth signal intensity There are close ties with standoff distance, may determine that mobile terminal by the size judging Bluetooth signal intensity And the distance between lock end;If the distance between mobile terminal and lock end is less (e.g., less than 10cm), show that mobile terminal is intended to unblank by user near lock end.When mobile terminal and lock end Between distance less time just think that user intends to unblank, the phenomenon opening by mistake lock can be prevented effectively from, finish Unexpectedly the coverage of Bluetooth signal is bigger (tens meters even tens meters).
When Bluetooth signal intensity meets pre-conditioned, show that mobile terminal is the least with the distance of lock end In predeterminable range (such as 10cm), show that mobile terminal is intended to unblank by user near lock end, Now can perform step S130.
Step S130: when meeting pre-conditioned, obtains the first end message unblanked in instruction also Checking.End message can be verified by lock end by the trust user profile prestored, the letter prestored Appoint user profile to include the trust user profile more than one group, have different between the user of different groups User right.Such as, the trust user profile prestored can include manager, member two groups.Management The manager of member's group has unlocking authority, the authority giving other mobile terminal temporary Authorization accounts and pipe The authority of reason lock end, and the member of member's group only has unlocking authority.
By verifying the unique identification information of the mobile terminal in above-mentioned end message or authorizing account to believe Whether breath is present in the trust user profile prestored, and judges whether mobile phone users has and unblanks Authority.Being present in which group, user then has the user right that this group is corresponding.Mandate as escribed above Account A belongs to the trust user of group of administrators, and other move end therefore to authorize account A to have imparting The authority of end temporary Authorization account.
The trust user profile prestored can utilize following pre-storage method to realize: initially sets up with mobile The Trusted channel of terminal, then obtains the user profile that mobile terminal provides, finally gives user profile The corresponding user right of user and be stored as trust user profile.In the present embodiment, set up with mobile The Trusted channel of terminal, may is that the bluetooth Trusted channel set up with mobile terminal;Or may is that By showing that Quick Response Code for mobile scanning terminal and sets up Trusted channel.
In brief, lock end data cube computation during user profile is trusted in storage, can be by indigo plant The mode of tooth communication and mobile terminal are set up bluetooth Trusted channel and are realized, when lock end is joined with mobile terminal To rear, its end message is sent to lock end and trusts user profile to be formed by mobile terminal;Or, Mobile terminal (can be implied with unique mark of lock end by the 2 D code information that scanning lock end is shown Information) realize and connection and the binding locking end, and be sent to its end message lock end to form letter Appoint user profile.
After step S130, step S140 can be performed.
Step S140: when end message is proved to be successful, response first instruction of unblanking is carried out unblanking behaviour Make.Unlocking operation includes that locking end directly unblanks or lock end to provide the permission manually unblanked.Directly unblanking can Being directly to open lock end so that door is opened;Allowing that lock end offer is manually unblanked is to represent lock end Needing door just to be made to open through manually unblanking after unlocking operation, lock end cannot before unlocking operation Manually unblank.
In order to improve the safety of lock end, lock end can include the first lock and the second lock, and includes referring to Stricture of vagina information identification module.Unlocking operation can be to open the first lock in certain embodiments.Step S140 Afterwards, it is also possible to include step: identify and verify finger print information, and after being proved to be successful, open second Lock.
Open the first lock by checking end message, open the second lock by checking finger print information, therefore End message and finger print information can be to be mutually related, i.e. end message and finger print information has mapping Relation.
When Bluetooth signal intensity meets pre-conditioned, show that mobile terminal is the least with the distance of lock end In predeterminable range, show that mobile terminal is intended to unblank by user near lock end, above-mentioned preset away from From can be very close to distance, such as 10cm;Can also be nearer distance, such as 1~2 meter. Therefore, if predeterminable range is nearer distance, mobile terminal can need not lock end, and When mobile terminal is from lock end 1~the distance of 2 meters, lock end can automated to respond to end message and unblanks, more Add conveniently.But, if user carries mobile terminal and enters indoor, if now in indoor through lock End, then be relatively easy to open by mistake lock or the situation of mobile terminal prompting by mistake.
Therefore, finger print information identification module can include outdoor finger print information identification module and indoor fingerprint Information identification module, and avoid the above-mentioned feelings opening by mistake lock or mobile terminal prompting by mistake in the following manner Condition:
If finger print information be lock end outdoor finger print information identification module identification, then step S140 it After, enter and no longer respond the state that the first of mobile terminal unblanks to instruct, and at the indoor fingerprint of lock end Information identification module opens the first lock and the second lock after re-recognizing and verify finger print information success.
Under aforesaid way, user carries mobile terminal and unblanks to enter behind indoor, even if user carries shifting Dynamic terminal is in indoor near lock end, and what lock end also will not respond that mobile terminal sends first unblanks to refer to Make and auto-unlocking;If user goes out, even if not carrying mobile terminal, user can also be in indoor By fingerprint, in indoor, realization is unblanked.If user carries mobile terminal and unblanks to go out by fingerprint, Then need to exit and no longer respond the state that the first of described mobile terminal unblanks to instruct, to facilitate under user Secondary return to unblank.Therefore, the indoor finger print information identification module at lock end re-recognizes and verifies fingerprint After opening the first lock and the second lock after information success, exit no longer responding the first of described mobile terminal and open The state of lock instruction.
Under aforesaid way, it should also be taken into account that multiple user carries the feelings of mobile device that can be used for unblanking Condition.When be simultaneously received the transmission of more than one mobile terminal first unblanks instruction, if finger print information For locking the outdoor finger print information identification module identification of end, the most after step s 140, enter the loudest Should the first of arbitrary mobile terminal the state unblanking instruction in more than one mobile terminal, and at lock end Indoor finger print information identification module re-recognizes and verifies and arbitrary movement in more than one mobile terminal The first lock and the second lock is opened after the finger print information success that terminal is associated.
Such as, user A carries terminal 1 (finger print information of user A and the terminal 1 that can be used for unblanking End message association), user B carries the terminal 2 (finger print information of user B that can be used for unblanking Associate with the end message of terminal 2), and simultaneously near lock end;Lock end receives terminal 1 and terminal 2 First unblank to open the first lock after instruction, outdoor finger print information identification module recognizes user A and use After one of them the finger print information finger print information of user A (assume be) of family B, lock end is the most permissible Open the second lock;Afterwards, lock end default user A and user B enters indoor, and therefore lock end is not Respond the first of terminal 1 and terminal 2 again to unblank instruction;And user A or user B is when going out, lock The indoor finger print information identification module of end re-recognizes and verifies user A or the finger print information of user B The first lock and the second lock is opened after success.Owing to end message and finger print information are associated, therefore pass through After finger print information judges that user A or user B goes out, lock end exits no longer response terminal 1 or terminal 2 First unblank instruction state.
Mobile terminal may need directly to unblank in long-range realization, therefore can be with giving mobile terminal with far The function that journey is directly unblanked.Lock brings out in security consideration, should not possess and communicate with mobile terminal remote Function.Therefore, it can to utilize with lock end can the bluetooth link terminal that is connected of bluetooth to realize this function, And bluetooth link terminal needs to be provided simultaneously with blue-teeth data and connects and the ability of telecommunication, i.e. in bluetooth The terminal that continues can receive the remote unlocking instruction that mobile terminal sends, and generates according to remote unlocking instruction The second of blue-teeth data form unblanks to instruct.In present intelligent appliance, many household appliances are permissible Serve as the role of bluetooth link terminal, or can be to lock the bluetooth link terminal that end is separately configured, It can be positioned over the place near lock end when using.Therefore, bluetooth link terminal was not made at this Many descriptions.
In certain embodiments, bluetooth link terminal can without possessing the ability of telecommunication, but Possess the ability connecting WiFi network, such as, connect the ability of WiFi router.I.e. bluetooth relaying is eventually The remote unlocking instruction that end forwards for receiving local router, and generate indigo plant according to remote unlocking instruction The second of tooth data mode unblanks to instruct;Wherein, remote unlocking instruction is led to by long-range by mobile terminal Letter passage is sent to local router.Telecommunication passage can include mobile data network or WiFi Network, i.e. mobile terminal can be real with local router by mobile data network or WiFi network Now connect;Then, the remote unlocking received from mobile terminal instruction is transmitted to bluetooth by local router Link terminal unblanks to instruct to generate second.
Realize the function of remote unlocking to study carefully root and need on earth being applied to Bluetooth function, if thus lock The duty of end possesses guard mode and normal condition, and remote unlocking function can only be in working order Normal condition can be used.
Therefore, when the duty locking end is normal condition, lock end can also carry out following steps, Fig. 2 is the method schematic diagram of Intelligent unlocking in normal state of an embodiment, incorporated by reference to Fig. 2.
Step S210: trust the second of communication interface reception bluetooth link terminal transmission by bluetooth and open Lock instruction.Second instruction instruction of unblanking with first of unblanking is similar, is all bluetooth number based on Bluetooth protocol According to bag, including code and the end message of unblanking, end message can include the unique of bluetooth link terminal Identification information, lock end is after the second of bluetooth link terminal transmission is unblanked to instruct identifying, it is not necessary to warp Cross the checking of judgement Bluetooth signal intensity (i.e. carrying out step S220).Wherein, bluetooth link terminal For receiving the remote unlocking instruction that mobile terminal sends, and generate bluetooth number according to remote unlocking instruction Unblank to instruct according to the second of form.
Step S220: obtain second unblank instruction in end message and verify.Proof procedure is with upper Stating step S130 to be similar to, lock end (can comprise bluetooth relaying eventually by the trust user profile prestored The unique identification information of end) end message is verified, do not repeat them here.
Step S230: when end message is proved to be successful, response second instruction of unblanking is carried out unblanking behaviour Make.Equally, unlocking operation includes that locking end directly unblanks or lock end to provide the permission manually unblanked.Directly Unblank can be directly to open lock end so that door is opened;Allowing that lock end offer is manually unblanked is table Show lock end need door just to be made to open through manually unblanking after unlocking operation, lock end unlocking operation it Before cannot manually unblank.
Fig. 3 is the smart lock module diagram of an embodiment.
Based on above-mentioned Intelligent unlocking method, the corresponding smart lock of one also provided below, comprising: Pre-storing module 100, receiver module 200, monitoring modular 300, authentication module 400, execution module 500 and judge module 600.
Pre-storing module 100 is used for the trust user profile that prestores;Receiver module 200 is for believing by bluetooth Appoint communication interface to receive the first of mobile terminal transmission to unblank to instruct;Monitoring modular 300 is used for obtaining indigo plant Tooth signal intensity, and it is pre-conditioned to judge whether Bluetooth signal intensity meets;Authentication module 400 is used for When meeting pre-conditioned, obtain first unblank instruction in end message and verify;Perform module 500, for when end message is proved to be successful, response first instruction of unblanking carries out unlocking operation;Sentence Disconnected module 600 sends for trusting communication interface reception mobile terminal at receiver module 200 by bluetooth First unblank instruction before judge duty.
Judge module 600 is used for judging duty.
Lock end can be preset with multiple duty.Here duty, for locking the duty of end, Multiple predefined or user-defined duty can be included, such as, can include normal shape State, guard mode, mode state etc. is set.In the following description, the main lock end that describes is in work Time normal condition and guard mode, and lock the end setting when user setup parameter or user profile Mode state.It is appreciated that duty can also include other duties freely defined.
Normal condition, is defined as locking end state in which normal use when, in this condition, All unlocking functions of lock end can be used.And guard mode, then it is defined as locking end in protection State in which under pattern, in this condition, the part unlocking function of lock end is rejected use.Refused The part unlocking function used absolutely can be arranged voluntarily by user, it is also possible to pre-when being product export If.Such as, when family have child and be grown up cannot guard at any time time, need in view of safety factors And the unlocking function that part is easily used by child is disabled, this kind of unlocking function such as includes by moving The function that dynamic terminal Bluetooth is unblanked, the function unblanked by integrated circuit card or only by password with regard to energy The function unblanked.
Therefore, it is judged that module 600 needs to judge the duty of lock end, when lock end is operated in During normal condition, receiver module 200 trust that communication interface receives that mobile terminal sends by bluetooth the One unblanks instructs;When locking end and being operated in guard mode, perform module 500 refusal response first and unblank Instruction.Namely when duty is guard mode, even if execution module 500 receives first and unblanks Second instructing or being described below unblanks to instruct, all without responding.
When locking end and being operated in normal condition, receiver module 200 is trusted communication interface by bluetooth and is received The first of mobile terminal transmission unblanks to instruct.Mobile terminal can be smart mobile phone, intelligent watch, put down Plate computer etc. portable set.
Bluetooth trusts communication interface it can be understood as lock end carried out bluetooth with mobile terminal the most in advance The communication interface matched and formed.Such as, lock end and mobile terminal have arrived in user's hands user again by it Bluetooth pairing.Through lock end and the mobile terminal of a Bluetooth pairing, it is equivalent to bluetooth pre-established Trust communication interface, so lock end and mobile terminal can directly build when bluetooth connects upper once carrying out Vertical Trusted channel, no longer carries out Bluetooth pairing.
Therefore, first to unblank to instruct be packet based on Bluetooth protocol.In order to reduce energy consumption, permissible Use bluetooth low energy consumption (BLE) technology.BLE technology uses interval of variable Connection Time, this Every could be arranged to several milliseconds to several seconds according to concrete application.It addition, because BLE technology is adopted By very quickly connected mode, may be at the most at ordinary times " disconnected " state (Standby, Holding state) to reduce energy consumption, now both link ends the most simply knows the other side, only in necessity Time just open link, then within the shortest time close link.Therefore, mobile terminal is not Need to send first to unblank to may be at holding state when of instruction, send first at needs and unblank to refer to Time the when of order (after such as identifying corresponding incoming event), mobile terminal switches from holding state To broadcast state to send broadcast message.Mobile terminal is during sending broadcast message, it is common that in advance If broadcast duration periodically send broadcast message.
First instruction of unblanking includes unblank code and end message.End message includes that mobile terminal is only One identification information or mandate account information.In the present embodiment, account information is authorized to include by lock end straight The mandate account connecing mandate or the temporary Authorization account indirectly authorized by the mobile terminal with authorization privilege Number.
The unique identification information of mobile terminal, for uniquely identifying mobile terminal, can be mobile terminal Physical address (MAC), it is also possible to be the IMEI of mobile terminal.When end message includes mobile whole During the unique identification information held, the unique identification information of the mobile terminal of authentication module 400 checking, and Just unblank after being proved to be successful, as long as in other words lock end identifies mobile terminal and can unblank.
Authorizing account information can be divided into two kinds, the first is the mandate account directly authorized by lock end, The second is the mandate account indirectly authorized by the mobile terminal with authorization privilege.The first can be The mandate account of lock end direct giving mobile terminal when that lock end and mobile terminal setting up data cube computation, This mandate account is stored in white list by locking end, belongs to permanent effective account;The second can be The temporary Authorization account given to other mobile terminals again by the mobile terminal directly authorized by lock end Number, temporary Authorization account here can be that mobile terminal is according to authorizing account and the create-rule preset (algorithm) generates, and this temporary Authorization account, can be by owing to having mapping contact with authorizing account Lock end identification, belongs to the effective account of short-term or disposable account (be used only once or for several times).
Such as, for mobile terminal 1, the lock direct giving mobile terminal of end 1 forever effectively authorizes account Number A, mobile terminal 1 can use mandate account A to unblank;Mobile terminal 1 can also basis Account A and generating algorithm K preset is authorized to generate temporary Authorization account a, and by temporary Authorization account A is sent to mobile terminal 2, and mobile terminal 2 re-uses temporary Authorization account a and unblanks, and lock end is being received After temporary Authorization account a, generating algorithm K is utilized to identify as authorizing account A indirectly to authorize Account, thus lock end and unblank so that mobile terminal 2 can utilize temporary Authorization account a to unblank. Temporary Authorization account a is the effective account of short-term or disposable account, such as can only be in 5 minutes Effectively or be used only once or for several times.
When temporary Authorization account a is the effective account of short-term, mobile terminal 1 needs to authorize account The generation moment T of a sends a mobile terminal 2, and therefore lock end and mobile terminal 1 need have synchronization Time, this can pre-set lock in time.Such as at T sometime, mobile terminal 1 According to authorizing account A, generating algorithm K and generating moment T generation temporary Authorization account a, lock end obtains Generating algorithm K is utilized to identify mandate account A and generate moment T after taking temporary Authorization account a, from And the effective time generating moment T deduction temporary Authorization account a can be utilized.
First unblank instruction the pattern of BLE broadcast message can be used to send.
In BLE technology, usual broadcast message has a data below structure:
Preamble Access Address PDU CRC
1 (byte) 4 (bytes) 2-39 (byte) 3 (bytes)
0x25
Preamble is preamble, and Access Address is reference address, and PDU is payload Data, CRC is check code.
PDU data has a data below structure:
Wherein Header is data head, and Payload is load data.Payload is divided into two parts, AdvA is broadcast address, and AdvData is broadcast data.Header generally includes broadcast-type information, Such as:
ADV_IND: omnidirectional broadcast can be connected
ADV_DIRECT_IND: directional broadcasting can be connected
ADV_NONCONN_IND: omnidirectional broadcast can not be connected
ADV_SCAN_IND: omnidirectional broadcast can be scanned
Therefore, the physical address (MAC) of mobile terminal can be positioned over AdvA, and code of unblanking And/or end message (such as authorizing account information) can be positioned over AdvData.
In the present embodiment, the first instruction of unblanking can be that the authentication module 400 of mobile terminal refers in checking Send after the success of stricture of vagina information.Namely before sending first and unblanking to instruct, authentication module 400 may require that Obtain the finger print information of user and verify, unblanking to instruct by just sending first after fingerprint authentication.First Instruction of unblanking can be that mobile terminal sends after identifying default incoming event, i.e. user mobile eventually End just sends first after carrying out corresponding input operation and unblanks to instruct.First unblank instruction can also be Mobile terminal begins to send voluntarily the when of lock end being detected.
Below instruction of only unblanking to first is illustrated, and in fact the first instruction of unblanking can be it His data mode, as long as meeting Bluetooth protocol.
Receiver module 200 receive first unblank instruction after, monitoring modular 300 obtains Bluetooth signal intensity, And it is pre-conditioned to judge whether Bluetooth signal intensity meets.Bluetooth signal intensity can use RSSI value table Show, receiver module 200 get first unblank instruction after, Bluetooth signal intensity level can be obtained, and Judge whether Bluetooth signal intensity meets pre-conditioned.The technology obtaining Bluetooth signal intensity belongs to conventional Technology, does not repeats them here.The size of Bluetooth signal intensity and standoff distance have close ties, pass through Judge that the size of Bluetooth signal intensity may determine that the distance between mobile terminal and lock end;If it is mobile Distance less (e.g., less than 10cm) between terminal and lock end, shows that user will move eventually End intends to unblank near lock end.When mobile terminal and lock end between distance less time just think that user beats Unblanking, can be prevented effectively from the phenomenon opening by mistake lock, the coverage of Bluetooth signal is bigger after all (tens meters even tens meters).
When Bluetooth signal intensity meets pre-conditioned, show that mobile terminal is the least with the distance of lock end In predeterminable range (such as 10cm), show that mobile terminal is intended to unblank by user near lock end, Now, authentication module 400 obtain first unblank instruction in end message and verify.Authentication module End message can be verified by 400 by the trust user profile prestored, the trust user prestored Information includes the trust user profile more than one group, has different user's power between the user of different groups Limit.Such as, the trust user profile prestored can include manager, member two groups.Group of administrators Manager has unlocking authority, the authority giving other mobile terminal temporary Authorization accounts and management lock end Authority, and member group member only there is unlocking authority.
Authentication module 400 is by verifying the unique identification information of the mobile terminal in above-mentioned end message Or authorize whether account information is present in the trust user profile prestored, judge mobile phone users Whether there is unlocking authority.Being present in which group, user then has the user right that this group is corresponding.Example The trust user authorizing account A to belong to group of administrators described above, therefore authorizes account A to have tax Give the authority of other mobile terminal temporary Authorization accounts.
The trust user profile prestored, pre-storing module 100 can utilize following pre-storage method to realize: Initially set up the Trusted channel with mobile terminal, then obtain the user profile that mobile terminal provides, The corresponding user right of user of rear imparting user profile also is stored as trusting user profile.The present embodiment In, set up the Trusted channel with mobile terminal, may is that the bluetooth set up with mobile terminal is trusted even Connect;Or may is that by showing that Quick Response Code for mobile scanning terminal and sets up Trusted channel.
In brief, lock end data cube computation during user profile is trusted in storage, can be by indigo plant The mode of tooth communication and mobile terminal are set up bluetooth Trusted channel and are realized, when lock end is joined with mobile terminal To rear, its end message is sent to lock end and trusts user profile to be formed by mobile terminal;Or, Mobile terminal (can be implied with unique mark of lock end by the 2 D code information that scanning lock end is shown Information) realize and connection and the binding locking end, and be sent to its end message lock end to form letter Appoint user profile.
When end message is proved to be successful, performs module 500 and respond the first instruction of unblanking and carry out unblanking behaviour Make.Unlocking operation includes that locking end directly unblanks or lock end to provide the permission manually unblanked.Directly unblanking can Being directly to open lock end so that door is opened;Allowing that lock end offer is manually unblanked is to represent lock end Needing door just to be made to open through manually unblanking after unlocking operation, lock end cannot before unlocking operation Manually unblank.
In order to improve the safety of lock end, smart lock can include the first lock and the second lock, and includes Finger print information identification module (not shown).Unlocking operation can be unlatching first in certain embodiments Lock.When end message is proved to be successful, performs module 500 and respond the first instruction of unblanking and carry out unblanking behaviour After work, finger print information identification module also identifies and verifies finger print information, and opens after being proved to be successful Second lock.
Open the first lock by checking end message, open the second lock by checking finger print information, therefore End message and finger print information can be to be mutually related, i.e. end message and finger print information has mapping Relation.
When Bluetooth signal intensity meets pre-conditioned, show that mobile terminal is the least with the distance of lock end In predeterminable range, show that mobile terminal is intended to unblank by user near lock end, above-mentioned preset away from From can be very close to distance, such as 10cm;Can also be nearer distance, such as 1~2 meter. Therefore, if predeterminable range is nearer distance, mobile terminal can need not lock end, and When mobile terminal is from lock end 1~the distance of 2 meters, lock end can automated to respond to end message and unblanks, more Add conveniently.But, if user carries mobile terminal and enters indoor, if now in indoor through lock End, then be relatively easy to open by mistake lock or the situation of mobile terminal prompting by mistake.
Therefore, finger print information identification module can include outdoor finger print information identification module and indoor fingerprint Information identification module, and avoid the above-mentioned feelings opening by mistake lock or mobile terminal prompting by mistake in the following manner Condition:
If finger print information is outdoor finger print information identification module identification, then at outdoor finger print information identification mould Block identification and verify finger print information and perform module 500 opens after being proved to be successful second lock after, hold Row module 500 enters and no longer responds the state that the first of mobile terminal unblanks to instruct, and at indoor fingerprint Information identification module opens the first lock and the second lock after re-recognizing and verify finger print information success.
Under aforesaid way, user carries mobile terminal and unblanks to enter behind indoor, even if user carries shifting Dynamic terminal is in indoor near lock end, and what smart lock also will not respond that mobile terminal sends first unblanks Instruct and auto-unlocking;If user goes out, even if not carrying mobile terminal, user can also be in room In by fingerprint in indoor realization unblank.If user carries outside mobile terminal unblanked by fingerprint Go out, then need to exit no longer responding the state that the first of described mobile terminal unblanks to instruct, to facilitate use Return to unblank next time in family.Therefore, the indoor finger print information identification module at lock end re-recognizes and verifies After opening the first lock and the second lock after finger print information success, exit and no longer respond the first of this mobile terminal Unblank instruction state.
Under aforesaid way, it should also be taken into account that multiple user carries the feelings of mobile device that can be used for unblanking Condition.When be simultaneously received the transmission of more than one mobile terminal first unblanks instruction, if finger print information For outdoor finger print information identification module identification, then refer in outdoor finger print information identification module identification checking After stricture of vagina information and execution module 500 open the second lock after being proved to be successful, perform module 500 and enter No longer respond in more than one mobile terminal the first of arbitrary mobile terminal the state unblanking instruction, and Indoor finger print information identification module re-recognizes and verifies and arbitrary movement in more than one mobile terminal The first lock and the second lock is opened after the finger print information success that terminal is associated.
Such as, user A carries terminal 1 (finger print information of user A and the terminal 1 that can be used for unblanking End message association), user B carries the terminal 2 (finger print information of user B that can be used for unblanking Associate with the end message of terminal 2), and simultaneously near smart lock;Smart lock receives terminal 1 and end The first of end 2 unblanks to open the first lock after instruction, and outdoor finger print information identification module recognizes user A After one of them the finger print information finger print information of user A (assume be) of user B, smart lock I.e. can open the second lock;Afterwards, smart lock default user A and user B enters indoor, because of This smart lock no longer responds the first of terminal 1 and terminal 2 and unblanks instruction;And user A or user B When going out, the indoor finger print information identification module of smart lock re-recognizes and verifies user A or user B Finger print information success after open first lock and second lock.Owing to end message is relevant with finger print information Connection, after therefore judging that user A or user B goes out by finger print information, smart lock exits the loudest The first of terminal 1 or terminal 2 is answered to unblank the state of instruction.
Mobile terminal may need directly to unblank in long-range realization, therefore can be with giving mobile terminal with far The function that journey is directly unblanked.Lock brings out in security consideration, should not possess and communicate with mobile terminal remote Function.Therefore, it can to utilize with lock end can the bluetooth link terminal that is connected of bluetooth to realize this function, And bluetooth link terminal needs to be provided simultaneously with blue-teeth data and connects and the ability of telecommunication, i.e. in bluetooth The terminal that continues can receive the remote unlocking instruction that mobile terminal sends, and generates according to remote unlocking instruction The second of blue-teeth data form unblanks to instruct.In present intelligent appliance, many household appliances are permissible Serve as the role of bluetooth link terminal, or can be to lock the bluetooth link terminal that end is separately configured, It can be positioned over the place near lock end when using.Therefore, bluetooth link terminal was not made at this Many descriptions.
In certain embodiments, bluetooth link terminal can without possessing the ability of telecommunication, but Possess the ability connecting WiFi network, such as, connect the ability of WiFi router.I.e. bluetooth relaying is eventually The remote unlocking instruction that end forwards for receiving local router, and generate indigo plant according to remote unlocking instruction The second of tooth data mode unblanks to instruct;Wherein, remote unlocking instruction is led to by long-range by mobile terminal Letter passage is sent to local router.Telecommunication passage can include mobile data network or WiFi Network, i.e. mobile terminal can be real with local router by mobile data network or WiFi network Now connect;Then, the remote unlocking received from mobile terminal instruction is transmitted to bluetooth by local router Link terminal unblanks to instruct to generate second.
Realize the function of remote unlocking to study carefully root and need on earth being applied to Bluetooth function, if thus lock The duty of end possesses guard mode and normal condition, and remote unlocking function can only be in working order Normal condition can be used.
Therefore, when the duty locking end is normal condition, receiver module 200 is additionally operable to by indigo plant Tooth trust communication interface receives the second of bluetooth link terminal transmission and unblanks to instruct;Authentication module 400 is also For obtain second unblank instruction in end message and verify;When described end message is proved to be successful Time, perform module 500 and be additionally operable to respond the second instruction of unblanking and carry out unlocking operation.Detailed process is as follows:
Receiver module 200 is trusted communication interface by bluetooth and is received the second of the transmission of bluetooth link terminal Unblank to instruct.Second instruction instruction of unblanking with first of unblanking is similar, is all bluetooth based on Bluetooth protocol Packet, including code and the end message of unblanking, end message can include bluetooth link terminal only One identification information, lock end is after the second of bluetooth link terminal transmission is unblanked to instruct identifying, it is not necessary to Through judging Bluetooth signal strength modification.Wherein, bluetooth link terminal is used for receiving mobile terminal transmission Remote unlocking instruction, and according to remote unlocking instruction generate blue-teeth data form second unblank refer to Order.
Authentication module 400 obtain second unblank instruction in end message and verify.Proof procedure is with upper Stating step S130 to be similar to, authentication module 400 (can comprise indigo plant by the trust user profile prestored The unique identification information of tooth link terminal) end message is verified, do not repeat them here.
When end message is proved to be successful, performs module 500 and respond the second instruction of unblanking and carry out unblanking behaviour Make.Equally, unlocking operation includes that locking end directly unblanks or lock end to provide the permission manually unblanked.Directly Unblank can be directly to open lock end so that door is opened;Allowing that lock end offer is manually unblanked is table Show lock end need door just to be made to open through manually unblanking after unlocking operation, lock end unlocking operation it Before cannot manually unblank.
It is appreciated that above-mentioned smart lock, it is also possible to possess fingerprint recognition, iris identification, password defeated Enter and integrated circuit card such as is unblanked at the conventional function, do not repeat them here.
Above-mentioned Intelligent unlocking method and smart lock, trust communication interface by bluetooth and receive mobile terminal First sent unblanks to instruct;Obtain Bluetooth signal intensity, and judge whether Bluetooth signal intensity meets Pre-conditioned;When meeting pre-conditioned, obtain first unblank instruction in end message and verify; When end message is proved to be successful, response the first instruction of unblanking carries out unlocking operation;Utilize mobile terminal Bluetooth module transmission instruction of unblanking go to unblank, unlocking operation can be saved, save time, convenience Preferably;And can realize unblanking just with the mobile terminal carried with, it is not necessary to use extra Unlocking tool, convenience improves further.
Although it should be understood that Fig. 1,2 flow chart in each step according to the instruction of arrow Show successively, but these steps are not the inevitable order indicated according to arrow to be performed successively.Unless Expressly stating otherwise herein, the not strictest order that performs of these steps limits, and it can be with Other order performs.And, Fig. 1, at least some of step in 2 can include multiple sub-step In rapid or multiple stages, these sub-steps or stage are not necessarily to have performed at synchronization, But can perform in the different moment, its execution sequence is also not necessarily and carries out successively, but permissible With other steps or the sub-step of other steps or stage at least some of the most in turn or alternately Ground performs.
The above is only the some embodiments of the present invention, it is noted that for the art For those of ordinary skill, under the premise without departing from the principles of the invention, it is also possible to make some improvement And retouching, these improvements and modifications also should be regarded as protection scope of the present invention.

Claims (10)

1. an Intelligent unlocking method, is applied to lock end, it is characterised in that comprise the steps:
Trust the first of communication interface reception mobile terminal transmission by bluetooth to unblank to instruct;
Obtain Bluetooth signal intensity, and it is pre-conditioned to judge whether Bluetooth signal intensity meets;
When meeting pre-conditioned, obtain first unblank instruction in end message and verify;
When described end message is proved to be successful, response the first instruction of unblanking carries out unlocking operation.
Intelligent unlocking method the most according to claim 1, it is characterised in that described terminal is believed Breath includes the unique identification information of described mobile terminal or authorizes account information.
Intelligent unlocking method the most according to claim 2, it is characterised in that described mandate account Number information includes the mandate account directly authorized by lock end or by having between the mobile terminal of authorization privilege Connect the temporary Authorization account of mandate.
Intelligent unlocking method the most according to claim 1, it is characterised in that by prestore Trust user profile end message is verified.
Intelligent unlocking method the most according to claim 4, it is characterised in that described in prestore Trust user profile and include the trust user profile more than one group, between the user of different groups, there is difference User right.
Intelligent unlocking method the most according to claim 4, it is characterised in that described in prestore The pre-storage method trusting user profile includes:
Set up the Trusted channel with mobile terminal;
Obtain the user profile that mobile terminal provides;
Give the corresponding user right of user of described user profile and be stored as trusting user profile.
Intelligent unlocking method the most according to claim 6, it is characterised in that described foundation with The Trusted channel of mobile terminal includes:
Set up the bluetooth Trusted channel with mobile terminal;
Or
By showing that Quick Response Code for mobile scanning terminal and sets up Trusted channel.
Intelligent unlocking method the most according to claim 1, it is characterised in that believed by bluetooth Before appointing the first of communication interface reception mobile terminal transmission to unblank to instruct, also include judging duty Step, when duty is normal condition, just perform by bluetooth trust communication interface receive move Move the step that the first of terminal transmission is unblanked to instruct.
Intelligent unlocking method the most according to claim 8, it is characterised in that work as duty During for normal condition, also execute the following steps:
Trust the second of communication interface reception bluetooth link terminal transmission by bluetooth to unblank to instruct;
Obtain second unblank instruction in end message and verify;
When described end message is proved to be successful, response the second instruction of unblanking carries out unlocking operation;
Wherein, the remote unlocking instruction that described bluetooth link terminal sends for receiving mobile terminal, and Generate the second of blue-teeth data form according to the instruction of described remote unlocking to unblank to instruct.
10. a smart lock, it is characterised in that including:
Receiver module, unblanks for trusting the first of communication interface reception mobile terminal transmission by bluetooth Instruction;
Monitoring modular, is used for obtaining Bluetooth signal intensity, and it is pre-to judge whether Bluetooth signal intensity meets If condition;
Authentication module, when meeting pre-conditioned, for obtaining the first end message unblanked in instruction And verify;And
Perform module, when described end message is proved to be successful, carry out for response the first instruction of unblanking Unlocking operation.
CN201610245086.3A 2016-04-19 2016-04-19 Intelligent unlocking method and smart lock Active CN105931330B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610245086.3A CN105931330B (en) 2016-04-19 2016-04-19 Intelligent unlocking method and smart lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610245086.3A CN105931330B (en) 2016-04-19 2016-04-19 Intelligent unlocking method and smart lock

Publications (2)

Publication Number Publication Date
CN105931330A true CN105931330A (en) 2016-09-07
CN105931330B CN105931330B (en) 2019-03-05

Family

ID=56839487

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610245086.3A Active CN105931330B (en) 2016-04-19 2016-04-19 Intelligent unlocking method and smart lock

Country Status (1)

Country Link
CN (1) CN105931330B (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106683246A (en) * 2016-12-23 2017-05-17 深圳怡化电脑股份有限公司 Safety door access control method and system
CN106846582A (en) * 2017-02-07 2017-06-13 武汉盛硕电子有限公司 A kind of intelligent door lock control method
CN106846584A (en) * 2017-02-13 2017-06-13 上海量明科技发展有限公司 Shared bicycle and its unlocking method, lockset, terminal and system
CN106934884A (en) * 2017-01-19 2017-07-07 云丁网络技术(北京)有限公司 A kind of method and its system of the intelligent door lock auto-unlocking based on mobile device
CN108338641A (en) * 2017-01-25 2018-07-31 致伸科技股份有限公司 Has the mailbox of wireless communication function
CN109104430A (en) * 2018-09-27 2018-12-28 西安艾润物联网技术服务有限责任公司 Auth method, device and computer readable storage medium
WO2019023975A1 (en) * 2017-08-02 2019-02-07 福建联迪商用设备有限公司 Method and system for automatic unlocking and locking of pos machine
CN109697797A (en) * 2017-10-20 2019-04-30 山东新北洋信息技术股份有限公司 A kind of express mail cabinet, express mail cabinet control method and express mail cabinet control device
CN109887127A (en) * 2017-12-06 2019-06-14 深圳中智科创机器人有限公司 A kind of intelligent door lock and its control method and system
CN109920113A (en) * 2019-03-13 2019-06-21 苏州华盖信息科技有限公司 The control method and intelligent lock system of intelligent lock system
CN110009768A (en) * 2018-01-04 2019-07-12 台湾福兴工业股份有限公司 Electronic lock and its control method
CN110086864A (en) * 2019-04-23 2019-08-02 厦门中锐电力科技有限公司 A method of it is managed offline using lockset dual key
CN111758248A (en) * 2020-02-14 2020-10-09 深圳市汇顶科技股份有限公司 Method, device and chip for automatically identifying identity
CN112446985A (en) * 2019-08-14 2021-03-05 云丁网络技术(北京)有限公司 Intelligent door lock unlocking method and device
CN113256852A (en) * 2021-05-13 2021-08-13 艾美达(天津)车业有限公司 Method and system for controlling unlocking and locking of intelligent vehicle
CN114049704A (en) * 2021-11-03 2022-02-15 珠海格力电器股份有限公司 Door lock control method and device, electronic equipment and storage medium
CN114399854A (en) * 2021-12-30 2022-04-26 荣耀终端有限公司 Unlocking method of intelligent door lock, mobile device and storage medium
CN115273278A (en) * 2022-03-16 2022-11-01 浙江利尔达物联网技术有限公司 Approaching automatic unlocking method based on BLE HID PROFILE
US11538298B2 (en) 2019-08-06 2022-12-27 Yunding Network Technology (Beijing) Co., Ltd. Devices and methods for controlling smart lock

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101260755A (en) * 2007-03-08 2008-09-10 英华达(上海)科技有限公司 Unlocking system and method
CN102610009A (en) * 2011-07-25 2012-07-25 宋功彬 Multi-user management access control system
CN103150798A (en) * 2013-03-15 2013-06-12 李凯 Door control system
CN103679872A (en) * 2013-11-12 2014-03-26 佛山市南海可得乐五金电子有限公司 System for unlocking door lock based on fingerprint and operating method and device
CN104050743A (en) * 2014-06-30 2014-09-17 重庆米润科技有限公司 Fortification monitoring system and method of access control system
CN104157061A (en) * 2014-08-21 2014-11-19 贵州华尚高新技术有限公司 Non-contact unlocking method and system
CN104732636A (en) * 2015-04-14 2015-06-24 重庆特斯联科技有限公司 Bluetooth cellphone-based intelligent community access control system and method
CN105155995A (en) * 2015-09-03 2015-12-16 上海电机学院 Safety door system and using method thereof

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101260755A (en) * 2007-03-08 2008-09-10 英华达(上海)科技有限公司 Unlocking system and method
CN102610009A (en) * 2011-07-25 2012-07-25 宋功彬 Multi-user management access control system
CN103150798A (en) * 2013-03-15 2013-06-12 李凯 Door control system
CN103679872A (en) * 2013-11-12 2014-03-26 佛山市南海可得乐五金电子有限公司 System for unlocking door lock based on fingerprint and operating method and device
CN104050743A (en) * 2014-06-30 2014-09-17 重庆米润科技有限公司 Fortification monitoring system and method of access control system
CN104157061A (en) * 2014-08-21 2014-11-19 贵州华尚高新技术有限公司 Non-contact unlocking method and system
CN104732636A (en) * 2015-04-14 2015-06-24 重庆特斯联科技有限公司 Bluetooth cellphone-based intelligent community access control system and method
CN105155995A (en) * 2015-09-03 2015-12-16 上海电机学院 Safety door system and using method thereof

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106683246A (en) * 2016-12-23 2017-05-17 深圳怡化电脑股份有限公司 Safety door access control method and system
CN106934884A (en) * 2017-01-19 2017-07-07 云丁网络技术(北京)有限公司 A kind of method and its system of the intelligent door lock auto-unlocking based on mobile device
CN108338641A (en) * 2017-01-25 2018-07-31 致伸科技股份有限公司 Has the mailbox of wireless communication function
CN106846582A (en) * 2017-02-07 2017-06-13 武汉盛硕电子有限公司 A kind of intelligent door lock control method
CN106846584A (en) * 2017-02-13 2017-06-13 上海量明科技发展有限公司 Shared bicycle and its unlocking method, lockset, terminal and system
WO2019023975A1 (en) * 2017-08-02 2019-02-07 福建联迪商用设备有限公司 Method and system for automatic unlocking and locking of pos machine
CN109697797A (en) * 2017-10-20 2019-04-30 山东新北洋信息技术股份有限公司 A kind of express mail cabinet, express mail cabinet control method and express mail cabinet control device
CN109887127A (en) * 2017-12-06 2019-06-14 深圳中智科创机器人有限公司 A kind of intelligent door lock and its control method and system
CN110009768A (en) * 2018-01-04 2019-07-12 台湾福兴工业股份有限公司 Electronic lock and its control method
CN109104430A (en) * 2018-09-27 2018-12-28 西安艾润物联网技术服务有限责任公司 Auth method, device and computer readable storage medium
CN109920113A (en) * 2019-03-13 2019-06-21 苏州华盖信息科技有限公司 The control method and intelligent lock system of intelligent lock system
CN110086864A (en) * 2019-04-23 2019-08-02 厦门中锐电力科技有限公司 A method of it is managed offline using lockset dual key
CN110086864B (en) * 2019-04-23 2021-10-08 厦门中锐电力科技有限公司 Method for offline management and control by using double keys of lock
US11538298B2 (en) 2019-08-06 2022-12-27 Yunding Network Technology (Beijing) Co., Ltd. Devices and methods for controlling smart lock
US11823510B2 (en) 2019-08-06 2023-11-21 Yunding Network Technology (Beijing) Co., Ltd. Devices and methods for controlling smart lock
CN112446985A (en) * 2019-08-14 2021-03-05 云丁网络技术(北京)有限公司 Intelligent door lock unlocking method and device
CN111758248A (en) * 2020-02-14 2020-10-09 深圳市汇顶科技股份有限公司 Method, device and chip for automatically identifying identity
CN113256852A (en) * 2021-05-13 2021-08-13 艾美达(天津)车业有限公司 Method and system for controlling unlocking and locking of intelligent vehicle
CN114049704A (en) * 2021-11-03 2022-02-15 珠海格力电器股份有限公司 Door lock control method and device, electronic equipment and storage medium
CN114049704B (en) * 2021-11-03 2023-01-13 珠海格力电器股份有限公司 Door lock control method and device, electronic equipment and storage medium
CN114399854A (en) * 2021-12-30 2022-04-26 荣耀终端有限公司 Unlocking method of intelligent door lock, mobile device and storage medium
CN115273278A (en) * 2022-03-16 2022-11-01 浙江利尔达物联网技术有限公司 Approaching automatic unlocking method based on BLE HID PROFILE

Also Published As

Publication number Publication date
CN105931330B (en) 2019-03-05

Similar Documents

Publication Publication Date Title
CN105931330A (en) Intelligent unlocking method and intelligent lock
CN102547680B (en) System of internet of things and safety management method for system of internet of things
CN105100010B (en) A kind of method for accessing network and each relevant device
KR101242122B1 (en) Method for remotely controlling doorlock apparatus using smart phone and the doorlock appratus
US8229358B2 (en) Identification, authentication and coverage control method
US20060109966A1 (en) Home security system
US20130331027A1 (en) Communications system providing remote access via mobile wireless communications device and related methods
CN103634795B (en) Radio communication device and method
CN104157029A (en) Access control system, mobile terminal based control method thereof and mobile terminal
KR20090122970A (en) Wireless communication techniques for controlling access granted by a security device
CN106604266A (en) Intelligent equipment system connection method, intelligent equipment and intelligent equipment access system
CN103220669A (en) Share method, system, server, terminal and gateway management server of private wireless local area network (WLAN)
CN101547444B (en) Method for providing special access process to different terminals in WLAN
CN104050742A (en) Intelligent door and control method and system thereof
CN101820344A (en) AAA server, home network access method and system
CN103517272B (en) Wireless network user authentication system and wireless network connection method thereof
CN105577805A (en) Remote control method of safe box and control system for realizing the method
EP2672464A1 (en) Communications system providing remote access via mobile wireless communications device and related methods
CN110858971A (en) Intelligent device network distribution method and system
CN104853354A (en) Bluetooth authentication method and system thereof
CN104902470B (en) A kind of connection control method and system of the hotspot based on dynamic key
CN111989723B (en) Sharing system
Suomalainen Smartphone assisted security pairings for the Internet of Things
CN105516974A (en) Router connection method, terminal and router
CN107944709A (en) A kind of training space Sharing Management system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220715

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right